Prevention of Black Hole Attack in Multicast Routing Protocols for Mobile Ad-Hoc Networks Using a Self-Organized Public Key Infrastructure

被引:4
|
作者
Anita, E. A. Mary [1 ]
Vasudevan, V. [2 ]
机构
[1] Anna Univ, Chennai, Tamil Nadu, India
[2] AK Coll Engn, Virudunagar, Tamil Nadu, India
来源
INFORMATION SECURITY JOURNAL | 2009年 / 18卷 / 05期
关键词
authentication; BHS-MAODV; Black Hole; certificate chain; MANET; MAODV;
D O I
10.1080/19393550903324928
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A mobile ad-hoc network (MANET) is an autonomous system of mobile nodes connected by wireless links in which nodes cooperate by forwarding packets for each other thereby enabling communication beyond direct wireless transmission range. Example applications include battlefield communication, disaster recovery operations, and mobile conferencing. The dynamic nature of ad-hoc networks makes them more vulnerable to security attacks compared with fixed networks. Providing security in mobile ad-hoc networks has been a major issue in recent years. Most of the secure routing protocols proposed by researchers need a centralized authority or a trusted third party to provide authentication. This destroys the self-organizing nature of ad-hoc networks. Black Hole attack is one of the routing attacks that occur in MANETs. In this attack, a malicious node uses the routing protocol to advertise itself as having the shortest path to the node whose packets it wants to intercept. In this article, we propose an enhanced certificate based authentication mechanism, where nodes authenticate each other by issuing certificates to neighboring nodes and generating public key without the need of any online centralized authority. The proposed scheme uses Multicast Ad-hoc On Demand Distance Vector Routing (MAODV) protocol as a support for certification. The effectiveness of our mechanism is illustrated by simulations conducted using network simulator ns-2.
引用
收藏
页码:248 / 256
页数:9
相关论文
共 50 条
  • [41] Prominent unicast routing protocols for Mobile Ad hoc Networks: Criterion, classification, and key attributes
    Saini, Trilok Kumar
    Sharma, Subhash C.
    AD HOC NETWORKS, 2019, 89 : 58 - 77
  • [42] Unethical Network Attack Detection and Prevention using Fuzzy based Decision System in Mobile Ad-hoc Networks
    Thanuja, R.
    Umamakeswari, A.
    JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2018, 13 (05) : 2086 - 2098
  • [43] Social Media Resilience During Infrastructure Breakdowns Using Mobile Ad-Hoc Networks
    Reuter, Christian
    Ludwig, Thomas
    Kaufhold, Marc-Andre
    Hupertz, Julian
    ADVANCES AND NEW TRENDS IN ENVIRONMENTAL INFORMATICS: STABILITY, CONTINUITY, INNOVATION, 2017, : 75 - 88
  • [44] Novel approach of detecting the black hole attack for vehicular ad-hoc networks based on capability indicators
    El Houssaini, Souad
    El Houssaini, Mohammed-Alamine
    El Kafi, Jamal
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2023, 19 (05) : 734 - 755
  • [45] Mitigating the Effects of Black hole Attacks on AODV Routing Protocol in Mobile Ad Hoc Networks
    Jain, Ashish Kumar
    Tokekar, Vrinda
    2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,
  • [46] Dynamic Routing Using Petal Ant Colony Optimization for Mobile Ad-hoc Networks
    Sathyaprakash, B. P.
    Kotari, Manjunath
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (10) : 790 - 796
  • [47] Fast authentication public key infrastructure for mobile ad hoc networks based on trusted computing
    Hao, Liming
    Li, Xiehua
    Yang, Shutang
    Lu, Songnian
    2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 910 - 913
  • [48] Performance Assessment of Reactive Routing Protocols in Mobile Ad-hoc Networks under CBR Traffic using NS2
    WasiUllah
    Ali, Haider
    Khan, A. Wajid
    ArshadFarhad
    BaseerAhmad
    Khan, Sadnan
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1026 - 1029
  • [49] A Comprehensive Performance Analysis of Energy Efficient Routing Protocols in different traffic based Mobile Ad-hoc Networks
    Gouda, Bhabani Sankar
    Dass, Ashish Kumar
    Narayana, K. Lakshmi
    2013 IEEE INTERNATIONAL MULTI CONFERENCE ON AUTOMATION, COMPUTING, COMMUNICATION, CONTROL AND COMPRESSED SENSING (IMAC4S), 2013, : 306 - 312
  • [50] Select Algorithm for Local Certificate Repository of Self-organized Key Management Scheme in Ad hoc Networks
    Liu Shizhong
    Zhang Zongyun
    FIFTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2013), 2013, 8878